your data packets move through the Tor network [Image A],
each relay node unpeels one layer of encryption, which points
to the next node, until the final exit node is reached, and the
unencrypted data is passed to the end destination.
>> So, the entry node doesn’t know what the data is or
where it’s going, but keep in mind it does know where you are.
Intermediate relay nodes don’t know where the data is going or
what the data is, while the final exit node doesn’t know where the
data has come from, but it does know the destination, and it can
interrogate the data unless you’re using a secured HTTPS site.
Of course, you also need to bear in mind that the final destination
can know everything about you if you’re not taking care to
anonymize yourself correctly.
3
USING TOR
If we were pedantic, we’d point out that if you’re
truly worried about privacy, you should dump
Windows and switch to Linux, but let’s stay in the real
world. The Tor Project has done a grand job of making
it super-easy to install and run; it’s not much more
complex than going to http://www.torproject.org, grabbing the
installer, running that, and using the Tor Browser.
You can ignore the “Configure” options when Tor is
first run—they’re for connecting via a proxy, and can be
set from within the browser later if need be.
If the Tor browser looks familiar, it’s because it’s
©^ a respin of Firefox, tooled to work directly with Tor,
EF
F.O
RG
,^ C
C^ B
Y^3
.^0 U
S
Take a look at how much
privacy protection Tor and
HTTPS offer when used.
Without either Tor or HTTPS
at every step in the process,
anybody with access to your
connection can potentially
snoop on all your activity,
including the destination
site, your username and
password, your user data,
and your location.
Using HTTPS helps to
protect your user data,
and your username and
password at all stages.
Using Tor masks your
destination site, username
and password, data, and, to a
certain degree, your location.
Adding a VPN would further
protect your location details,
but we should point out that
there could be government
bodies directly accessing
ISP data or the site.com
services via unknown
snooping programs.
TOR AND HTTPS IN USE
SITE.COM
USER/PW
DATA
LOCATION
SITE.COM•
- USER/PW•
- DATA•
LOCATION
- DATA•
SITE.COM•
- USER/PW•
- DATA•
LOCATION
- DATA•
SITE.COM•
- USER/PW•
- DATA•
LOCATION
- DATA•
SITE.COM•
- USER/PW•
- DATA•
LOCATION
- DATA•
SITE.COM
USER/PW
DATA
LOCATION•
SITE.COM
USER/PW
DATA
LOCATION•
SITE.COM
USER/PW
DATA
LOCATION•
SITE.COM
- USER/PW
- DATA
LOCATION•
- DATA
SITE.COM
- USER/PW
- DATA
LOCATION•
- DATA
SITE.COM•
- USER/PW•
- DATA•
LOCATION
- DATA•
SITE.COM•
USER/PW•
DATA•
LOCATION
SITE.COM•
USER/PW•
DATA•
LOCATION•
SITE.COM•
- USER/PW
- DATA
LOCATION•
- DATA
KEY
HIDDEN BY TOR
HIDDEN BY HTTPS
INTERNET CONNECTION
EAVESDROPPING
DATA SHARING
TOR NETWORK
maximumpc.com MAR 2020 MAXIMUMPC 61